CVE-2023-3935

A heap buffer overflow vulnerability in Wibu CodeMeter Runtime network service up to version 7.60b allows an unauthenticated, remote attacker to achieve RCE and gain full access of the host system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wibu:codemeter_runtime:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:trumpf:oseon:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:programmingtube:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:teczonebend:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:tops_unfold:05.03.00.00:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:topscalculation:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trumpflicenseexpert:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutops:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutops_cell_classic:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutops_cell_sw48:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutops_mark_3d:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutopsboost:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutopsfab:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutopsfab_storage_smallstore:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutopsprint:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutopsprintmultilaserassistant:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutopsweld:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:tubedesign:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:phoenixcontact:activation_wizard:*:*:*:*:*:moryx:*:*
cpe:2.3:a:phoenixcontact:e-mobility_charging_suite:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:fl_network_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:iol-conf:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:module_type_package_designer:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:module_type_package_designer:1.2.0:beta:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:plcnext_engineer:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:18

Type Values Removed Values Added
References () https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/AdvisoryWIBU-230704-01-v3.0.pdf - Vendor Advisory () https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/AdvisoryWIBU-230704-01-v3.0.pdf - Vendor Advisory
References () https://cert.vde.com/en/advisories/VDE-2023-030/ - Third Party Advisory () https://cert.vde.com/en/advisories/VDE-2023-030/ - Third Party Advisory
References () https://cert.vde.com/en/advisories/VDE-2023-031/ - Third Party Advisory () https://cert.vde.com/en/advisories/VDE-2023-031/ - Third Party Advisory

25 Jan 2024, 20:24

Type Values Removed Values Added
References () https://cert.vde.com/en/advisories/VDE-2023-030/ - () https://cert.vde.com/en/advisories/VDE-2023-030/ - Third Party Advisory
CPE cpe:2.3:a:phoenixcontact:plcnext_engineer:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:activation_wizard:*:*:*:*:*:moryx:*:*
cpe:2.3:a:phoenixcontact:module_type_package_designer:1.2.0:beta:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:e-mobility_charging_suite:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:fl_network_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:iol-conf:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:module_type_package_designer:*:*:*:*:*:*:*:*
First Time Phoenixcontact iol-conf
Phoenixcontact plcnext Engineer
Phoenixcontact activation Wizard
Phoenixcontact
Phoenixcontact fl Network Manager
Phoenixcontact module Type Package Designer
Phoenixcontact e-mobility Charging Suite

Information

Published : 2023-09-13 14:15

Updated : 2024-11-21 08:18


NVD link : CVE-2023-3935

Mitre link : CVE-2023-3935

CVE.ORG link : CVE-2023-3935


JSON object : View

Products Affected

wibu

  • codemeter_runtime

trumpf

  • trutops_mark_3d
  • trutopsfab
  • programmingtube
  • trutopsprint
  • trutopsboost
  • trutops_cell_classic
  • trutopsfab_storage_smallstore
  • topscalculation
  • trumpflicenseexpert
  • trutopsweld
  • trutops_cell_sw48
  • teczonebend
  • trutops
  • tubedesign
  • oseon
  • tops_unfold
  • trutopsprintmultilaserassistant

phoenixcontact

  • fl_network_manager
  • activation_wizard
  • plcnext_engineer
  • module_type_package_designer
  • iol-conf
  • e-mobility_charging_suite
CWE
CWE-787

Out-of-bounds Write